SFD Text for Public Key Cryptography

sunflowerplateAI and Robotics

Nov 21, 2013 (3 years and 8 months ago)

57 views

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
1

SFD Text for Public Key Cryptography

Date:

2012
-
03
-
03

Authors:

Name

Affiliations

Address

Phone

email

Hiroki Nakano

Trans New
Technology,
Inc.

Sumitomo

Seimei

Kyoto Bldg. 8F,

62
Tukiboko
-
cho
,
Shimogyo,

Kyoto 600
-
8492
JAPAN

+81
-
75
-
213
-
1200

cas@trans
-
nt.com

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
2

Abstract

This proposal includes the text intended for inclusion into
Section 3 (Security Framework).

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
3

Proposed SFD Text

1.
The TGai amendment defines the following schemes
separately
: STA (user) authentication (by AP), AP
authentication (by STA) and key
generation/management.

2.
The TGai amendment defines ECDH
-
based key
agreement as one of the key generation/management
methods.

3.
The TGai amendment defines methods using IETF
X.509 Certificate as one of the AP authentication.

4.
The TGai amendment defines methods using IETF
X.509 Certificate as one of the STA authentication.


Submission

doc.: IEEE 11
-
12/0272r1

Terminology

ECDH: Elliptic Curve Diffie
-
Hellman


IETF X.509 Certificate: Public Key Certificate and its
Revocation List defined by RFC5280

Slide
4

Hiroki Nakano, Trans New Technology, Inc.

March 2012

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology,
Inc.

Slide
5

Intention of Text 1


Users and network designers currently use various
authentication schemes such as Shared Secret through
Public Key Certificate. TGai should make effort to
satisfy their requirements.

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology,
Inc.

Slide
6

Intention of Text 2


ECDH have now become a reasonable option as a key
generation algorithm. “
NSA Suite B Cryptography”
also specify use of ECDH as the key exchange
algorithm.

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology,
Inc.

Slide
7

Intention of Text 3


IETF X.509 Certificate
-
based authentication for web
servers is widely deployed. This is also used for Web
-
based authentication of wireless LAN networks. And
also, IETF X.509 Certificate
-
based authentication is
used by EAP
-
TTLS and EAP
-
PEAP. This text leads
TGai amendment to support the equivalent level of
security as such Web
-
based authentication technology
when STA starts to communicate to new AP.

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology,
Inc.

Slide
8

Intention of Text 4


IETF X.509 Certificate
-
based user authentication is
used by combination of EAP
-
TLS and IEEE802.1X.
This text leads TGai amendment to support the
equivalent level of security as EAP
-
TLS.

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
9

Straw poll 1

Do you support

to include the following text in SFD.



“The TGai amendment defines the following schemes
separately
: STA (user) authentication (by AP), AP
authentication (by STA) and key
generation/management.”



Yes:


No:


Abstain:

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
10

Straw poll 2

Do you support

to include the following text in SFD.



“The TGai amendment defines ECDH
-
based key
agreement as one of the key generation/management
methods.”



Yes:


No:


Abstain:

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
11

Straw poll 3

Do you support

to include the following text in SFD.



“The TGai amendment defines methods using IETF
X.509 Certificate as one of the AP authentication.”



Yes:


No:


Abstain:

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New Technology, Inc.

Slide
12

Straw poll 4

Do you support

to include the following text in SFD.



“The TGai amendment defines methods using IETF
X.509 Certificate as one of the STA authentication.”



Yes:


No:


Abstain:

Submission

doc.: IEEE 11
-
12/0272r1

March 2012

Hiroki Nakano, Trans New
Technology, Inc.

Slide
13

Backup